{"id":51462,"date":"2024-06-13T10:25:40","date_gmt":"2024-06-13T14:25:40","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51462"},"modified":"2024-06-13T10:25:40","modified_gmt":"2024-06-13T14:25:40","slug":"shrinklocker-ransomware-encrypts-with-bitlocker","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/51462\/","title":{"rendered":"ShrinkLocker ransomware employing BitLocker for encryption"},"content":{"rendered":"<p>While investigating a cybersecurity incident, Kaspersky\u2019s experts discovered new ransomware they\u2019ve dubbed \u201cShrinkLocker\u201d. An interesting feature of this malware is that its creators artfully use the built-in capabilities of Windows to lock down computers the malware has infected. In particular, ShrinkLocker uses the standard full-disc encryption utility BitLocker to block access to the data.<\/p>\n<h2>What makes ShrinkLocker dangerous?<\/h2>\n<p>Like most ransomware today, ShrinkLocker encrypts the victim\u2019s local drives to block access to their contents. What it essentially does is activate a standard security feature \u2014 BitLocker.<\/p>\n<p>ShrinkLocker shrinks the computer\u2019s drive partitions by 100 megabytes \u2014 hence its name \u2014 and uses the freed-up space to create a boot partition for itself. While it\u2019s at it, it disables every BitLocker key-recovery mechanism, and sends the key that was used for the drives\u2019 encryption to the attacker\u2019s server.<\/p>\n<p>After the user restarts the computer, they\u2019re presented with the standard BitLocker password prompt. Since the user is now unable to start the system, ShrinkLocker changes the labels of all system drives to the attacker\u2019s email address instead of leaving a ransom note.<\/p>\n<h2>How ShrinkLocker works<\/h2>\n<p>ShrinkLocker is implemented as a complex VBScript. It starts by gathering information about the operating system \u2014 primarily, its version. If the script finds that it\u2019s running on Windows 2000, XP, 2003, or Vista, it shuts down. For newer editions of Windows, it runs parts of its code that are optimized for the relevant operating system.<\/p>\n<p>Next, it runs preparatory operations on the local drives as mentioned above, and modifies several registry keys to configure the system for running BitLocker smoothly with the settings that the attacker requires.<\/p>\n<div id=\"attachment_51463\" style=\"width: 790px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/06\/13094820\/shrinklocker-ransomware-encrypts-with-bitlocker-1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-51463\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/06\/13094820\/shrinklocker-ransomware-encrypts-with-bitlocker-1.png\" alt=\"ShrinkLocker changes the volume label to an email address \" width=\"780\" height=\"123\" class=\"size-full wp-image-51463\"><\/a><p id=\"caption-attachment-51463\" class=\"wp-caption-text\">ShrinkLocker writes the attacker\u2019s email address to the volume label<\/p><\/div>\n<p>Then it disables and removes all default BitLocker protectors to prevent key recovery, and enables the numerical password-protector option.<\/p>\n<p>The script then generates this password and initiates encryption of all local drives using the newly created password. After this, ShrinkLocker sends an HTTP POST request containing the password and system information to the attacker\u2019s command-and-control server.<\/p>\n<p>To mask the actual server address, the threat actor uses several trycloudflare.com subdomains. This is a legitimate domain owned by CloudFlare and designed for website developers to test website traffic tunneling capabilities.<\/p>\n<p>In its final stages, ShrinkLocker covers its tracks by removing its files from the drive, clearing Windows PowerShell logs, and so on. Finally, the script restarts the system.<\/p>\n<p>If the user tries choosing a recovery option while the machine is booting up, they get a message stating that no BitLocker recovery options are available.<\/p>\n<div id=\"attachment_51464\" style=\"width: 894px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/06\/13095031\/shrinklocker-ransomware-encrypts-with-bitlocker-2.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-51464\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/06\/13095031\/shrinklocker-ransomware-encrypts-with-bitlocker-2.png\" alt=\"ShrinkLocker aftermath\" width=\"884\" height=\"645\" class=\"size-full wp-image-51464\"><\/a><p id=\"caption-attachment-51464\" class=\"wp-caption-text\">ShrinkLocker has blocked access to the drive with BitLocker, and no recovery options are available<\/p><\/div>\n<p>Regarding the geographical distribution of infections, our researchers have observed ShrinkLocker and its modifications in Indonesia, Jordan, and Mexico. You can find more details about the ShrinkLocker modus operandi in <a href=\"https:\/\/securelist.com\/ransomware-abuses-bitlocker\/112643\/\" target=\"_blank\" rel=\"noopener\">our report on Securelist<\/a>.<\/p>\n<h2>How to protect yourself from ShrinkLocker<\/h2>\n<p>Here are some tips for how to protect against ShrinkLocker and other ransomware threats:<\/p>\n<ul>\n<li>Apply the <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-the-principle-of-least-privilege\/50232\/\" target=\"_blank\" rel=\"noopener nofollow\">principle of least privilege<\/a>. In particular, users should not be given permissions to modify the registry or enable full-volume encryption.<\/li>\n<li>Enable traffic monitoring. In addition to HTTP GET requests, it\u2019s also helpful to log HTTP POST. In case of infection, requests to the attacker\u2019s C&amp;C server may contain passwords and keys.<\/li>\n<li>Monitor events associated with VBS and PowerShell execution. Save scripts and commands you discover to external storage, as the malware may delete your local logs.<\/li>\n<li>Back up your data regularly. Use offline storage for backups and verify their integrity.<\/li>\n<li>Use a reliable security solution on all corporate devices. For example, <a href=\"https:\/\/www.kaspersky.com\/small-to-medium-business-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> detects ShrinkLocker with the verdicts Trojan.VBS.SAgent.gen, Trojan-Ransom.VBS.BitLock.gen, and Trojan.Win32.Generic.<\/li>\n<li>Use <a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener nofollow\">EDR (Endpoint Detection and Response)<\/a> solutions to monitor suspicious activity on your corporate network.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"37723\">\n","protected":false},"excerpt":{"rendered":"<p>Our experts have discovered ransomware they\u2019ve dubbed \u201cShrinkLocker\u201d, which encrypts infected computers\u2019 drives using BitLocker \u2014 a utility built into Windows.<\/p>\n","protected":false},"author":2726,"featured_media":51465,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3051,3052],"tags":[420],"class_list":{"0":"post-51462","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/51462\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/27570\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/22885\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/30241\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/27720\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/37621\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/shrinklocker-ransomware-encrypts-with-bitlocker\/27863\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/33714\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/shrinklocker-ransomware-encrypts-with-bitlocker\/33378\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51462","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51462"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51462\/revisions"}],"predecessor-version":[{"id":51466,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51462\/revisions\/51466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/51465"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51462"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51462"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51462"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}